Windows 7 Memory_management/System_Service_Exception/and more

adam380

New Member
Hi i have lately been having a few blue screens

such as
Memory_management
System_Service_Exception
System_Thread_Exception_Not_Handled_M
Kmode_exception_not_handled

also at the begginning of the year i was getting Driver_irql_not less or equal and bad_pool_header.

My systems Specs are

Processor:Amd phenom II x6 1055t stock clock
Motherboard Asrock n68c-gs ucc
Graphics Card: Asus HD 5770 1gb gddr5
Ram: Kingston 4gb Not sure of timers
Hard drives:1tb 5400rpm hdd and 80gb not sure of speed hdd for Os
Operating System: Windows 7 ultimate 64 bit with sp1 update.

Notes/What i have done to try stop bsod:Before i installed my 80gb hard drive the os i was getting the blue screens like irql not less or equal and bad pool header.

I at 1st thaught this was a heat issue so i went and bought a new case Cooler master haf 922 along with 3x 120mm fans the case comes with 2x 200mm fans
i then thaught it was cpu heat issue
so i bought a new heatsink Hyper 212 plus with 120mm fan.

neither of them worked so i rma'd my graphics card no luck after that i have ran memtest for over 6 hours with no fails.

I have uploaded the only memory dumps i have i would have had more but i tried a fresh windows install about 3 times to try get rid of this problem.


View attachment MiniDumps.rar

Also 1st post new to forum :).

Thanks.

Adam.

(Edit: I keep my system defragged aswell if that means anything)
 
Last edited:
Most likely wrong clocks/timings/voltage.


1. Attach 2 screenshots of CPUZ memory and CPU tabs.
Attach Rammon HTML.zip.


2. Uninstall MSI Afterburner


3. Uninstall AVG

AVG Worldwide - Download tools

Link Removed due to 404 Error



4. Update drivers (it most likely won't fix you though)

ATI
atikmdag.sys Wed Jan 26 17:48:28 2011

nForce
nvmf6264.sys Thu Apr 30 15:45:59 2009

VIA Audio
viahduaa.sys Wed Nov 25 08:06:00 2009

XBox USB wireless controller
xusb21.sys Thu Aug 13 18:10:17 2009




CRASH DUMPS

Code:
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042311-30765-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a5d000 PsLoadedModuleList = 0xfffff800`02c9ae50
Debug session time: Sat Apr 23 13:39:55.342 2011 (UTC - 4:00)
System Uptime: 0 days 0:04:39.967
Loading Kernel Symbols
...................................................
Loading User Symbols
Cannot read PEB32 from WOW64 TEB32 00080018 - Win32 error 0n30
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {403, fffff6800029f8f8, cdd0000099e4a867, ffdff6800029f8f8}

Probably caused by : Unknown_Image ( ANALYSIS_INCONCLUSIVE )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: fffff6800029f8f8
Arg3: cdd0000099e4a867
Arg4: ffdff6800029f8f8

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_403

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff8a003182130 to 00000000776fa834

STACK_TEXT:  
00000000`0012dcc0 fffff8a0`03182130 : 00000000`05420000 fa800392`2da80460 02000000`00025c1a 00000000`0008b2b6 : 0x776fa834
00000000`0012dcc8 00000000`05420000 : fa800392`2da80460 02000000`00025c1a 00000000`0008b2b6 00000000`00085860 : 0xfffff8a0`03182130
00000000`0012dcd0 fa800392`2da80460 : 02000000`00025c1a 00000000`0008b2b6 00000000`00085860 fffff8a0`02f27860 : 0x5420000
00000000`0012dcd8 02000000`00025c1a : 00000000`0008b2b6 00000000`00085860 fffff8a0`02f27860 00000000`05420000 : 0xfa800392`2da80460
00000000`0012dce0 00000000`0008b2b6 : 00000000`00085860 fffff8a0`02f27860 00000000`05420000 fa800381`b67004e0 : 0x2000000`00025c1a
00000000`0012dce8 00000000`00085860 : fffff8a0`02f27860 00000000`05420000 fa800381`b67004e0 02000000`000881e5 : 0x8b2b6
00000000`0012dcf0 fffff8a0`02f27860 : 00000000`05420000 fa800381`b67004e0 02000000`000881e5 00000000`00000c68 : 0x85860
00000000`0012dcf8 00000000`05420000 : fa800381`b67004e0 02000000`000881e5 00000000`00000c68 00000000`00000003 : 0xfffff8a0`02f27860
00000000`0012dd00 fa800381`b67004e0 : 02000000`000881e5 00000000`00000c68 00000000`00000003 fffff8a0`02c66fa8 : 0x5420000
00000000`0012dd08 02000000`000881e5 : 00000000`00000c68 00000000`00000003 fffff8a0`02c66fa8 00000000`05460001 : 0xfa800381`b67004e0
00000000`0012dd10 00000000`00000c68 : 00000000`00000003 fffff8a0`02c66fa8 00000000`05460001 fa80058e`1f9004c0 : 0x2000000`000881e5
00000000`0012dd18 00000000`00000003 : fffff8a0`02c66fa8 00000000`05460001 fa80058e`1f9004c0 02000000`0008662a : 0xc68
00000000`0012dd20 fffff8a0`02c66fa8 : 00000000`05460001 fa80058e`1f9004c0 02000000`0008662a 00000000`00086a9d : 0x3
00000000`0012dd28 00000000`05460001 : fa80058e`1f9004c0 02000000`0008662a 00000000`00086a9d 00000000`0008819b : 0xfffff8a0`02c66fa8
00000000`0012dd30 fa80058e`1f9004c0 : 02000000`0008662a 00000000`00086a9d 00000000`0008819b fffff8a0`032d11d0 : 0x5460001
00000000`0012dd38 02000000`0008662a : 00000000`00086a9d 00000000`0008819b fffff8a0`032d11d0 00000000`01420000 : 0xfa80058e`1f9004c0
00000000`0012dd40 00000000`00086a9d : 00000000`0008819b fffff8a0`032d11d0 00000000`01420000 fa800387`8f9004c0 : 0x2000000`0008662a
00000000`0012dd48 00000000`0008819b : fffff8a0`032d11d0 00000000`01420000 fa800387`8f9004c0 02000000`00080dc5 : 0x86a9d
00000000`0012dd50 fffff8a0`032d11d0 : 00000000`01420000 fa800387`8f9004c0 02000000`00080dc5 00000000`0008629d : 0x8819b
00000000`0012dd58 00000000`01420000 : fa800387`8f9004c0 02000000`00080dc5 00000000`0008629d 00000000`0007d49d : 0xfffff8a0`032d11d0
00000000`0012dd60 fa800387`8f9004c0 : 02000000`00080dc5 00000000`0008629d 00000000`0007d49d fffff680`000a106a : 0x1420000
00000000`0012dd68 02000000`00080dc5 : 00000000`0008629d 00000000`0007d49d fffff680`000a106a 00000000`00400000 : 0xfa800387`8f9004c0
00000000`0012dd70 00000000`0008629d : 00000000`0007d49d fffff680`000a106a 00000000`00400000 00000000`00000080 : 0x2000000`00080dc5
00000000`0012dd78 00000000`0007d49d : fffff680`000a106a 00000000`00400000 00000000`00000080 00000000`0007b381 : 0x8629d
00000000`0012dd80 fffff680`000a106a : 00000000`00400000 00000000`00000080 00000000`0007b381 00000000`00085d97 : 0x7d49d
00000000`0012dd88 00000000`00400000 : 00000000`00000080 00000000`0007b381 00000000`00085d97 00000000`00086e6f : 0xfffff680`000a106a
00000000`0012dd90 00000000`00000080 : 00000000`0007b381 00000000`00085d97 00000000`00086e6f fffff8a0`03208188 : 0x400000
00000000`0012dd98 00000000`0007b381 : 00000000`00085d97 00000000`00086e6f fffff8a0`03208188 00000000`05420000 : 0x80
00000000`0012dda0 00000000`00085d97 : 00000000`00086e6f fffff8a0`03208188 00000000`05420000 fa8004ac`7ea80460 : 0x7b381
00000000`0012dda8 00000000`00086e6f : fffff8a0`03208188 00000000`05420000 fa8004ac`7ea80460 02000000`00087c8e : 0x85d97
00000000`0012ddb0 fffff8a0`03208188 : 00000000`05420000 fa8004ac`7ea80460 02000000`00087c8e 00000000`00085e9f : 0x86e6f
00000000`0012ddb8 00000000`05420000 : fa8004ac`7ea80460 02000000`00087c8e 00000000`00085e9f 00000000`0008669f : 0xfffff8a0`03208188
00000000`0012ddc0 fa8004ac`7ea80460 : 02000000`00087c8e 00000000`00085e9f 00000000`0008669f fffff680`00227eca : 0x5420000
00000000`0012ddc8 02000000`00087c8e : 00000000`00085e9f 00000000`0008669f fffff680`00227eca 00000000`00400000 : 0xfa8004ac`7ea80460
00000000`0012ddd0 00000000`00085e9f : 00000000`0008669f fffff680`00227eca 00000000`00400000 00000000`00000080 : 0x2000000`00087c8e
00000000`0012ddd8 00000000`0008669f : fffff680`00227eca 00000000`00400000 00000000`00000080 00000000`0008119b : 0x85e9f
00000000`0012dde0 fffff680`00227eca : 00000000`00400000 00000000`00000080 00000000`0008119b 00000000`00027aa0 : 0x8669f
00000000`0012dde8 00000000`00400000 : 00000000`00000080 00000000`0008119b 00000000`00027aa0 00000000`000872a0 : 0xfffff680`00227eca
00000000`0012ddf0 00000000`00000080 : 00000000`0008119b 00000000`00027aa0 00000000`000872a0 fffff680`00127802 : 0x400000
00000000`0012ddf8 00000000`0008119b : 00000000`00027aa0 00000000`000872a0 fffff680`00127802 00000000`00400000 : 0x80
00000000`0012de00 00000000`00027aa0 : 00000000`000872a0 fffff680`00127802 00000000`00400000 00000000`00000080 : 0x8119b
00000000`0012de08 00000000`000872a0 : fffff680`00127802 00000000`00400000 00000000`00000080 00000000`00079e52 : 0x27aa0
00000000`0012de10 fffff680`00127802 : 00000000`00400000 00000000`00000080 00000000`00079e52 00000000`000860a1 : 0x872a0
00000000`0012de18 00000000`00400000 : 00000000`00000080 00000000`00079e52 00000000`000860a1 00000000`0008cea1 : 0xfffff680`00127802
00000000`0012de20 00000000`00000080 : 00000000`00079e52 00000000`000860a1 00000000`0008cea1 fffff680`0034a182 : 0x400000
00000000`0012de28 00000000`00079e52 : 00000000`000860a1 00000000`0008cea1 fffff680`0034a182 00000000`00400000 : 0x80
00000000`0012de30 00000000`000860a1 : 00000000`0008cea1 fffff680`0034a182 00000000`00400000 00000000`00000080 : 0x79e52
00000000`0012de38 00000000`0008cea1 : fffff680`0034a182 00000000`00400000 00000000`00000080 00000000`000843ba : 0x860a1
00000000`0012de40 fffff680`0034a182 : 00000000`00400000 00000000`00000080 00000000`000843ba 00000000`0005b6b4 : 0x8cea1
00000000`0012de48 00000000`00400000 : 00000000`00000080 00000000`000843ba 00000000`0005b6b4 00000000`00000001 : 0xfffff680`0034a182
00000000`0012de50 00000000`00000080 : 00000000`000843ba 00000000`0005b6b4 00000000`00000001 fffff680`0033b828 : 0x400000
00000000`0012de58 00000000`000843ba : 00000000`0005b6b4 00000000`00000001 fffff680`0033b828 00000000`05560001 : 0x80
00000000`0012de60 00000000`0005b6b4 : 00000000`00000001 fffff680`0033b828 00000000`05560001 00000000`00000080 : 0x843ba
00000000`0012de68 00000000`00000001 : fffff680`0033b828 00000000`05560001 00000000`00000080 00000000`00033b0a : 0x5b6b4
00000000`0012de70 fffff680`0033b828 : 00000000`05560001 00000000`00000080 00000000`00033b0a 00000000`000863a3 : 0x1
00000000`0012de78 00000000`05560001 : 00000000`00000080 00000000`00033b0a 00000000`000863a3 00000000`000749a3 : 0xfffff680`0033b828
00000000`0012de80 00000000`00000080 : 00000000`00033b0a 00000000`000863a3 00000000`000749a3 fffff680`00349792 : 0x5560001
00000000`0012de88 00000000`00033b0a : 00000000`000863a3 00000000`000749a3 fffff680`00349792 00000000`00400000 : 0x80
00000000`0012de90 00000000`000863a3 : 00000000`000749a3 fffff680`00349792 00000000`00400000 00000000`00000080 : 0x33b0a
00000000`0012de98 00000000`000749a3 : fffff680`00349792 00000000`00400000 00000000`00000080 00000000`00011a12 : 0x863a3
00000000`0012dea0 fffff680`00349792 : 00000000`00400000 00000000`00000080 00000000`00011a12 00000000`000850a4 : 0x749a3
00000000`0012dea8 00000000`00400000 : 00000000`00000080 00000000`00011a12 00000000`000850a4 00000000`00087da4 : 0xfffff680`00349792
00000000`0012deb0 00000000`00000080 : 00000000`00011a12 00000000`000850a4 00000000`00087da4 fffff680`00349162 : 0x400000
00000000`0012deb8 00000000`00011a12 : 00000000`000850a4 00000000`00087da4 fffff680`00349162 00000000`00400000 : 0x80
00000000`0012dec0 00000000`000850a4 : 00000000`00087da4 fffff680`00349162 00000000`00400000 00000000`00000080 : 0x11a12
00000000`0012dec8 00000000`00087da4 : fffff680`00349162 00000000`00400000 00000000`00000080 00000000`00011a12 : 0x850a4
00000000`0012ded0 fffff680`00349162 : 00000000`00400000 00000000`00000080 00000000`00011a12 00000000`0005acbc : 0x87da4
00000000`0012ded8 00000000`00400000 : 00000000`00000080 00000000`00011a12 00000000`0005acbc 00000000`00000001 : 0xfffff680`00349162
00000000`0012dee0 00000000`00000080 : 00000000`00011a12 00000000`0005acbc 00000000`00000001 fffff680`0033abc0 : 0x400000
00000000`0012dee8 00000000`00011a12 : 00000000`0005acbc 00000000`00000001 fffff680`0033abc0 00000000`05560001 : 0x80
00000000`0012def0 00000000`0005acbc : 00000000`00000001 fffff680`0033abc0 00000000`05560001 00000000`00000080 : 0x11a12
00000000`0012def8 00000000`00000001 : fffff680`0033abc0 00000000`05560001 00000000`00000080 00000000`000850e0 : 0x5acbc
00000000`0012df00 fffff680`0033abc0 : 00000000`05560001 00000000`00000080 00000000`000850e0 00000000`00085fa6 : 0x1
00000000`0012df08 00000000`05560001 : 00000000`00000080 00000000`000850e0 00000000`00085fa6 00000000`00086ea6 : 0xfffff680`0033abc0
00000000`0012df10 00000000`00000080 : 00000000`000850e0 00000000`00085fa6 00000000`00086ea6 fffff680`0011ea82 : 0x5560001


STACK_COMMAND:  kb

SYMBOL_NAME:  ANALYSIS_INCONCLUSIVE

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: Unknown_Module

IMAGE_NAME:  Unknown_Image

DEBUG_FLR_IMAGE_TIMESTAMP:  0

BUCKET_ID:  BAD_STACK

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042511-38234-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a12000 PsLoadedModuleList = 0xfffff800`02c4fe50
Debug session time: Mon Apr 25 02:56:56.758 2011 (UTC - 4:00)
System Uptime: 0 days 2:55:10.477
Loading Kernel Symbols
...............................................................
................................................................
.......................................
Loading User Symbols
Loading unloaded module list
............
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1A, {403, fffff68000051568, e9c000003dfe2867, ffdff68000051568}

Probably caused by : ntkrnlmp.exe ( nt! ?? ::FNODOBFM::`string'+31ef2 )

Followup: MachineOwner
---------

1: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

MEMORY_MANAGEMENT (1a)
    # Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000000403, The subtype of the bugcheck.
Arg2: fffff68000051568
Arg3: e9c000003dfe2867
Arg4: ffdff68000051568

Debugging Details:
------------------


BUGCHECK_STR:  0x1a_403

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  prime95.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002af46c8 to fffff80002a82740

STACK_TEXT:  
fffff880`09df77b8 fffff800`02af46c8 : 00000000`0000001a 00000000`00000403 fffff680`00051568 e9c00000`3dfe2867 : nt!KeBugCheckEx
fffff880`09df77c0 fffff800`02ab3381 : 00000000`00000000 fffff680`00051ff8 fffffa80`082f3060 fffff800`02a871fa : nt! ?? ::FNODOBFM::`string'+0x31ef2
fffff880`09df7970 fffff800`02ac40da : 00000000`00000000 00000000`14d20fff fffffa80`00000000 fffffa80`082f3060 : nt!MiDeleteVirtualAddresses+0x408
fffff880`09df7b30 fffff800`02a81993 : ffffffff`ffffffff 00000000`03f1f800 00000000`03f1f7c8 00000000`00008000 : nt!NtFreeVirtualMemory+0x5ca
fffff880`09df7c20 00000000`76fcf89a : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x13
00000000`03f1f738 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x76fcf89a


STACK_COMMAND:  kb

FOLLOWUP_IP: 
nt! ?? ::FNODOBFM::`string'+31ef2
fffff800`02af46c8 cc              int     3

SYMBOL_STACK_INDEX:  1

SYMBOL_NAME:  nt! ?? ::FNODOBFM::`string'+31ef2

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0x1a_403_nt!_??_::FNODOBFM::_string_+31ef2

BUCKET_ID:  X64_0x1a_403_nt!_??_::FNODOBFM::_string_+31ef2

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042311-34796-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a19000 PsLoadedModuleList = 0xfffff800`02c56e50
Debug session time: Sat Apr 23 13:45:10.905 2011 (UTC - 4:00)
System Uptime: 0 days 0:04:35.530
Loading Kernel Symbols
...................................................
Loading User Symbols
Loading unloaded module list
...
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1E, {ffffffffc0000005, fffff80002a8c905, 0, ffffffffffffffff}

Probably caused by : ntkrnlmp.exe ( nt!ExpInterlockedPopEntrySListFault16+0 )

Followup: MachineOwner
---------

0: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

KMODE_EXCEPTION_NOT_HANDLED (1e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff80002a8c905, The address that the exception occurred at
Arg3: 0000000000000000, Parameter 0 of the exception
Arg4: ffffffffffffffff, Parameter 1 of the exception

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
nt!ExpInterlockedPopEntrySListFault16+0
fffff800`02a8c905 498b08          mov     rcx,qword ptr [r8]

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc10e0
 ffffffffffffffff 

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

BUGCHECK_STR:  0x1E_c0000005

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from fffff80002a9724a to fffff880042297f2

STACK_TEXT:  
fffff800`0408fc98 fffff800`02a9724a : 00000000`00369e99 fffffa80`04660dd8 fffff800`02c11c40 00000000`00000002 : 0xfffff880`042297f2
fffff800`0408fca0 fffff800`02a91ebc : fffff800`02c03e80 fffff800`00000000 00000000`00000000 fffff880`0442fdb0 : nt!PoIdle+0x53a
fffff800`0408fd80 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiIdleLoop+0x2c


STACK_COMMAND:  .bugcheck ; kb

FOLLOWUP_IP: 
nt!ExpInterlockedPopEntrySListFault16+0
fffff800`02a8c905 498b08          mov     rcx,qword ptr [r8]

SYMBOL_NAME:  nt!ExpInterlockedPopEntrySListFault16+0

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: nt

IMAGE_NAME:  ntkrnlmp.exe

DEBUG_FLR_IMAGE_TIMESTAMP:  4cc791bd

FAILURE_BUCKET_ID:  X64_0x1E_c0000005_nt!ExpInterlockedPopEntrySListFault16+0

BUCKET_ID:  X64_0x1E_c0000005_nt!ExpInterlockedPopEntrySListFault16+0

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042311-38671-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a19000 PsLoadedModuleList = 0xfffff800`02c56e50
Debug session time: Sat Apr 23 15:37:33.464 2011 (UTC - 4:00)
System Uptime: 0 days 1:50:49.183
Loading Kernel Symbols
...............................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
............
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 1000007E, {ffffffffc0000005, fffff88005362cee, fffff880021356a8, fffff88002134f10}

Probably caused by : dxgmms1.sys ( dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+22 )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck.  Usually the exception address pinpoints
the driver/function that caused the problem.  Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003.  This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG.  This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG.  This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff88005362cee, The address that the exception occurred at
Arg3: fffff880021356a8, Exception Record Address
Arg4: fffff88002134f10, Context Record Address

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+22
fffff880`05362cee 488b18          mov     rbx,qword ptr [rax]

EXCEPTION_RECORD:  fffff880021356a8 -- (.exr 0xfffff880021356a8)
ExceptionAddress: fffff88005362cee (dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+0x0000000000000022)
   ExceptionCode: c0000005 (Access violation)
  ExceptionFlags: 00000000
NumberParameters: 2
   Parameter[0]: 0000000000000000
   Parameter[1]: ffffffffffffffff
Attempt to read from address ffffffffffffffff

CONTEXT:  fffff88002134f10 -- (.cxr 0xfffff88002134f10)
rax=5958504b06090003 rbx=0000000000000000 rcx=fffffa80058cf000
rdx=fffffa8005320f70 rsi=fffffa80043114a0 rdi=fffffa80058cf000
rip=fffff88005362cee rsp=fffff880021358e0 rbp=fffffa80055ddde8
 r8=fffffa8004a48701  r9=0000000000000000 r10=0000000000000000
r11=00000000000001ff r12=000000000000016b r13=0000000000000001
r14=0000000000000000 r15=0000000000000001
iopl=0         nv up ei ng nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010282
dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+0x22:
fffff880`05362cee 488b18          mov     rbx,qword ptr [rax] ds:002b:5958504b`06090003=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

PROCESS_NAME:  System

CURRENT_IRQL:  0

ERROR_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

EXCEPTION_PARAMETER1:  0000000000000000

EXCEPTION_PARAMETER2:  ffffffffffffffff

READ_ADDRESS: GetPointerFromAddress: unable to read from fffff80002cc10e0
 ffffffffffffffff 

FOLLOWUP_IP: 
dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+22
fffff880`05362cee 488b18          mov     rbx,qword ptr [rax]

BUGCHECK_STR:  0x7E

LAST_CONTROL_TRANSFER:  from fffff8800535fed3 to fffff88005362cee

STACK_TEXT:  
fffff880`021358e0 fffff880`0535fed3 : 00000000`00000000 fffffa80`043114a0 00000000`0000016b 00000000`00000000 : dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+0x22
fffff880`02135910 fffff880`0537a65d : 00000000`00000000 fffff8a0`095a6b40 fffffa80`00000000 fffffa80`04a48750 : dxgmms1!VIDMM_GLOBAL::PrepareDmaBuffer+0x43f
fffff880`02135ae0 fffff880`0537a398 : fffff880`009ecfc0 fffff880`05379d00 fffffa80`00000000 fffffa80`00000000 : dxgmms1!VidSchiSubmitRenderCommand+0x241
fffff880`02135cd0 fffff880`05379e96 : 00000000`00000000 fffffa80`03699bd0 00000000`00000080 fffffa80`0375d410 : dxgmms1!VidSchiSubmitQueueCommand+0x50
fffff880`02135d00 fffff800`02d2c7c6 : 00000000`06c2dc48 fffffa80`056d6b60 fffffa80`0370a380 fffffa80`056d6b60 : dxgmms1!VidSchiWorkerThread+0xd6
fffff880`02135d40 fffff800`02a67c26 : fffff880`009e8180 fffffa80`056d6b60 fffff880`009f3040 00000000`00000000 : nt!PspSystemThreadStartup+0x5a
fffff880`02135d80 00000000`00000000 : fffff880`02136000 fffff880`02130000 fffff880`02135690 00000000`00000000 : nt!KxStartSystemThread+0x16


SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+22

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: dxgmms1

IMAGE_NAME:  dxgmms1.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d3fa174

STACK_COMMAND:  .cxr 0xfffff88002134f10 ; kb

FAILURE_BUCKET_ID:  X64_0x7E_dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+22

BUCKET_ID:  X64_0x7E_dxgmms1!VIDMM_GLOBAL::ReferenceAllocationForPreparation+22

Followup: MachineOwner
---------




Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.


Loading Dump File [F:\DMP\042411-34125-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available

Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is: 
Windows 7 Kernel Version 7600 MP (6 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7600.16695.amd64fre.win7_gdr.101026-1503
Machine Name:
Kernel base = 0xfffff800`02a55000 PsLoadedModuleList = 0xfffff800`02c92e50
Debug session time: Sat Apr 23 23:30:00.788 2011 (UTC - 4:00)
System Uptime: 0 days 2:26:56.523
Loading Kernel Symbols
...............................................................
................................................................
.....................................
Loading User Symbols
Loading unloaded module list
....
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

Use !analyze -v to get detailed debugging information.

BugCheck 3B, {c0000005, fffff8800435b23b, fffff880094e48f0, 0}

Probably caused by : atikmpag.sys ( atikmpag+a23b )

Followup: MachineOwner
---------

3: kd> !analyze -v
*******************************************************************************
*                                                                             *
*                        Bugcheck Analysis                                    *
*                                                                             *
*******************************************************************************

SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff8800435b23b, Address of the instruction which caused the bugcheck
Arg3: fffff880094e48f0, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.

Debugging Details:
------------------


EXCEPTION_CODE: (NTSTATUS) 0xc0000005 - The instruction at 0x%08lx referenced memory at 0x%08lx. The memory could not be %s.

FAULTING_IP: 
atikmpag+a23b
fffff880`0435b23b 488b4008        mov     rax,qword ptr [rax+8]

CONTEXT:  fffff880094e48f0 -- (.cxr 0xfffff880094e48f0)
rax=0000000000000001 rbx=fffff880094e5380 rcx=fffffa80068f9040
rdx=ffffffffffb70fc0 rsi=fffff880094e5430 rdi=fffffa80068f9438
rip=fffff8800435b23b rsp=fffff880094e52c0 rbp=fffffa80068f9040
 r8=0000000000000000  r9=0000000000000000 r10=0000000000000000
r11=fffffa80068f9040 r12=fffffa8004b99700 r13=000000000000002a
r14=fffff880094e5388 r15=fffffa800593f000
iopl=0         nv up ei pl nz na pe nc
cs=0010  ss=0018  ds=002b  es=002b  fs=0053  gs=002b             efl=00010202
atikmpag+0xa23b:
fffff880`0435b23b 488b4008        mov     rax,qword ptr [rax+8] ds:002b:00000000`00000009=????????????????
Resetting default scope

CUSTOMER_CRASH_COUNT:  1

DEFAULT_BUCKET_ID:  VISTA_DRIVER_FAULT

BUGCHECK_STR:  0x3B

PROCESS_NAME:  godfather2.exe

CURRENT_IRQL:  0

LAST_CONTROL_TRANSFER:  from 0000000000000000 to fffff8800435b23b

STACK_TEXT:  
fffff880`094e52c0 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : atikmpag+0xa23b


FOLLOWUP_IP: 
atikmpag+a23b
fffff880`0435b23b 488b4008        mov     rax,qword ptr [rax+8]

SYMBOL_STACK_INDEX:  0

SYMBOL_NAME:  atikmpag+a23b

FOLLOWUP_NAME:  MachineOwner

MODULE_NAME: atikmpag

IMAGE_NAME:  atikmpag.sys

DEBUG_FLR_IMAGE_TIMESTAMP:  4d409c8d

STACK_COMMAND:  .cxr 0xfffff880094e48f0 ; kb

FAILURE_BUCKET_ID:  X64_0x3B_atikmpag+a23b

BUCKET_ID:  X64_0x3B_atikmpag+a23b

Followup: MachineOwner
---------





DRIVERS

Code:
start             end                 module name
fffff880`00efe000 fffff880`00f55000   ACPI     ACPI.sys     Mon Jul 13 19:19:34 2009 (4A5BC106)
fffff880`02cd3000 fffff880`02d5d000   afd      afd.sys      Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`0538c000 fffff880`053a2000   AgileVpn AgileVpn.sys Mon Jul 13 20:10:24 2009 (4A5BCCF0)
fffff880`051c9000 fffff880`051dd000   amdiox64 amdiox64.sys Thu Feb 18 10:17:53 2010 (4B7D5A21)
fffff880`041b5000 fffff880`041ca000   amdppm   amdppm.sys   Mon Jul 13 19:19:25 2009 (4A5BC0FD)
fffff880`011b2000 fffff880`011bd000   amdxata  amdxata.sys  Tue May 19 13:56:59 2009 (4A12F2EB)
fffff880`00e1a000 fffff880`00e23000   atapi    atapi.sys    Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00db5000 fffff880`00ddf000   ataport  ataport.SYS  Mon Jul 13 19:19:52 2009 (4A5BC118)
fffff880`04412000 fffff880`0456a000   athrx    athrx.sys    Tue Jun 09 14:06:49 2009 (4A2EA4B9)
fffff880`04840000 fffff880`0513c000   atikmdag atikmdag.sys Wed Jan 26 17:48:28 2011 (4D40A4BC)
fffff880`04351000 fffff880`0439f000   atikmpag atikmpag.sys Wed Jan 26 17:13:33 2011 (4D409C8D)
fffff880`00fe9000 fffff880`00ffa000   avgfwd6a avgfwd6a.sys Sun Jul 11 21:38:24 2010 (4C3A7210)
fffff880`03845000 fffff880`03870000   AVGIDSDriver AVGIDSDriver.Sys Wed Mar 30 10:57:08 2011 (4D9344C4)
fffff880`0188c000 fffff880`01896000   AVGIDSEH AVGIDSEH.Sys Tue Feb 22 00:23:04 2011 (4D634838)
fffff880`05e74000 fffff880`05e7f000   AVGIDSFilter AVGIDSFilter.Sys Wed Feb 09 23:59:37 2011 (4D5370B9)
fffff880`04140000 fffff880`0418f000   avgldx64 avgldx64.sys Thu Jan 06 23:36:39 2011 (4D269857)
fffff880`019ea000 fffff880`019f9000   avgmfx64 avgmfx64.sys Tue Mar 01 07:25:15 2011 (4D6CE5AB)
fffff880`01880000 fffff880`0188c000   avgrkx64 avgrkx64.sys Tue Jan 18 21:31:31 2011 (4D364D03)
fffff880`02c2f000 fffff880`02c8e000   avgtdia  avgtdia.sys  Thu Feb 10 00:50:32 2011 (4D537CA8)
fffff880`018c2000 fffff880`018c9000   Beep     Beep.SYS     Mon Jul 13 20:00:13 2009 (4A5BCA8D)
fffff880`0412f000 fffff880`04140000   blbdrive blbdrive.sys Mon Jul 13 19:35:59 2009 (4A5BC4DF)
fffff880`039d3000 fffff880`039f1000   bowser   bowser.sys   Wed Feb 23 00:15:06 2011 (4D6497DA)
fffff960`00640000 fffff960`00667000   cdd      cdd.dll      Wed Jan 26 01:31:34 2011 (4D3FBFC6)
fffff880`04292000 fffff880`042af000   cdfs     cdfs.sys     Mon Jul 13 19:19:46 2009 (4A5BC112)
fffff880`011bd000 fffff880`011e7000   cdrom    cdrom.sys    Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`00cf5000 fffff880`00db5000   CI       CI.dll       Mon Jul 13 21:32:13 2009 (4A5BE01D)
fffff880`01850000 fffff880`01880000   CLASSPNP CLASSPNP.SYS Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00c97000 fffff880`00cf5000   CLFS     CLFS.SYS     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`0147d000 fffff880`014f0000   cng      cng.sys      Mon Jul 13 19:49:40 2009 (4A5BC814)
fffff880`0537c000 fffff880`0538c000   CompositeBus CompositeBus.sys Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`04400000 fffff880`0440e000   crashdmp crashdmp.sys Mon Jul 13 20:01:01 2009 (4A5BCABD)
fffff880`0408e000 fffff880`04111000   csc      csc.sys      Mon Jul 13 19:24:26 2009 (4A5BC22A)
fffff880`04111000 fffff880`0412f000   dfsc     dfsc.sys     Mon Jul 13 19:23:44 2009 (4A5BC200)
fffff880`0407f000 fffff880`0408e000   discache discache.sys Mon Jul 13 19:37:18 2009 (4A5BC52E)
fffff880`0183a000 fffff880`01850000   disk     disk.sys     Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`04815000 fffff880`04837000   drmk     drmk.sys     Mon Jul 13 21:01:25 2009 (4A5BD8E5)
fffff880`042bb000 fffff880`042c4000   dump_atapi dump_atapi.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`042af000 fffff880`042bb000   dump_dumpata dump_dumpata.sys Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`042c4000 fffff880`042d7000   dump_dumpfve dump_dumpfve.sys Mon Jul 13 19:21:51 2009 (4A5BC18F)
fffff880`042d7000 fffff880`042e3000   Dxapi    Dxapi.sys    Mon Jul 13 19:38:28 2009 (4A5BC574)
fffff880`05242000 fffff880`05336000   dxgkrnl  dxgkrnl.sys  Tue Jan 25 23:22:56 2011 (4D3FA1A0)
fffff880`05336000 fffff880`0537c000   dxgmms1  dxgmms1.sys  Tue Jan 25 23:22:12 2011 (4D3FA174)
fffff880`0104c000 fffff880`01060000   fileinfo fileinfo.sys Mon Jul 13 19:34:25 2009 (4A5BC481)
fffff880`01000000 fffff880`0104c000   fltmgr   fltmgr.sys   Mon Jul 13 19:19:59 2009 (4A5BC11F)
fffff880`01501000 fffff880`0150b000   Fs_Rec   Fs_Rec.sys   Mon Jul 13 19:19:45 2009 (4A5BC111)
fffff880`01800000 fffff880`0183a000   fvevol   fvevol.sys   Fri Sep 25 22:34:26 2009 (4ABD7DB2)
fffff880`018ca000 fffff880`01914000   fwpkclnt fwpkclnt.sys Mon Jul 13 19:21:08 2009 (4A5BC164)
fffff800`02a0c000 fffff800`02a55000   hal      hal.dll      Mon Jul 13 21:27:36 2009 (4A5BDF08)
fffff880`04577000 fffff880`0459b000   HDAudBus HDAudBus.sys Mon Jul 13 20:06:13 2009 (4A5BCBF5)
fffff880`04200000 fffff880`0425c000   HdAudio  HdAudio.sys  Mon Jul 13 20:06:59 2009 (4A5BCC23)
fffff880`04279000 fffff880`04292000   HIDCLASS HIDCLASS.SYS Mon Jul 13 20:06:21 2009 (4A5BCBFD)
fffff880`04837000 fffff880`0483f080   HIDPARSE HIDPARSE.SYS Mon Jul 13 20:06:17 2009 (4A5BCBF9)
fffff880`05a45000 fffff880`05a53000   hidusb   hidusb.sys   Mon Jul 13 20:06:22 2009 (4A5BCBFE)
fffff880`0390b000 fffff880`039d3000   HTTP     HTTP.sys     Mon Jul 13 19:22:16 2009 (4A5BC1A8)
fffff880`019ce000 fffff880`019d7000   hwpolicy hwpolicy.sys Mon Jul 13 19:19:22 2009 (4A5BC0FA)
fffff880`0522f000 fffff880`0523e000   kbdclass kbdclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`045ed000 fffff880`045fb000   kbdhid   kbdhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff800`00ba0000 fffff800`00baa000   kdcom    kdcom.dll    Sat Feb 05 07:21:45 2011 (4D4D40D9)
fffff880`05186000 fffff880`051c9000   ks       ks.sys       Wed Mar 03 23:32:25 2010 (4B8F37D9)
fffff880`013b9000 fffff880`013d3000   ksecdd   ksecdd.sys   Mon Jul 13 19:20:54 2009 (4A5BC156)
fffff880`013d3000 fffff880`013fe000   ksecpkg  ksecpkg.sys  Fri Dec 11 01:03:32 2009 (4B21E0B4)
fffff880`05a3d000 fffff880`05a42200   ksthunk  ksthunk.sys  Mon Jul 13 20:00:19 2009 (4A5BCA93)
fffff880`03878000 fffff880`0388d000   lltdio   lltdio.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`02c00000 fffff880`02c23000   luafv    luafv.sys    Mon Jul 13 19:26:13 2009 (4A5BC295)
fffff880`00c76000 fffff880`00c83000   mcupdate_AuthenticAMD mcupdate_AuthenticAMD.dll Mon Jul 13 21:29:09 2009 (4A5BDF65)
fffff880`04000000 fffff880`0400e000   monitor  monitor.sys  Mon Jul 13 19:38:52 2009 (4A5BC58C)
fffff880`05177000 fffff880`05186000   mouclass mouclass.sys Mon Jul 13 19:19:50 2009 (4A5BC116)
fffff880`051ef000 fffff880`051fc000   mouhid   mouhid.sys   Mon Jul 13 20:00:20 2009 (4A5BCA94)
fffff880`00e00000 fffff880`00e1a000   mountmgr mountmgr.sys Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`03800000 fffff880`03818000   mpsdrv   mpsdrv.sys   Mon Jul 13 20:08:25 2009 (4A5BCC79)
fffff880`03818000 fffff880`03845000   mrxsmb   mrxsmb.sys   Wed Feb 23 00:15:23 2011 (4D6497EB)
fffff880`05e03000 fffff880`05e51000   mrxsmb10 mrxsmb10.sys Wed Feb 23 00:15:14 2011 (4D6497E2)
fffff880`05e51000 fffff880`05e74000   mrxsmb20 mrxsmb20.sys Wed Feb 23 00:15:13 2011 (4D6497E1)
fffff880`00e23000 fffff880`00e2e000   Msfs     Msfs.SYS     Mon Jul 13 19:19:47 2009 (4A5BC113)
fffff880`00f5e000 fffff880`00f68000   msisadrv msisadrv.sys Mon Jul 13 19:19:26 2009 (4A5BC0FE)
fffff880`01060000 fffff880`010be000   msrpc    msrpc.sys    Mon Jul 13 19:21:32 2009 (4A5BC17C)
fffff880`04074000 fffff880`0407f000   mssmbios mssmbios.sys Mon Jul 13 19:31:10 2009 (4A5BC3BE)
fffff880`019bc000 fffff880`019ce000   mup      mup.sys      Mon Jul 13 19:23:45 2009 (4A5BC201)
fffff880`0150b000 fffff880`015fd000   ndis     ndis.sys     Mon Jul 13 19:21:40 2009 (4A5BC184)
fffff880`053c6000 fffff880`053d2000   ndistapi ndistapi.sys Mon Jul 13 20:10:00 2009 (4A5BCCD8)
fffff880`038e0000 fffff880`038f3000   ndisuio  ndisuio.sys  Mon Jul 13 20:09:25 2009 (4A5BCCB5)
fffff880`05200000 fffff880`0522f000   ndiswan  ndiswan.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`04800000 fffff880`04815000   NDProxy  NDProxy.SYS  Mon Jul 13 20:10:05 2009 (4A5BCCDD)
fffff880`02da2000 fffff880`02db1000   netbios  netbios.sys  Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff880`02c8e000 fffff880`02cd3000   netbt    netbt.sys    Mon Jul 13 19:21:28 2009 (4A5BC178)
fffff880`01400000 fffff880`01460000   NETIO    NETIO.SYS    Mon Jul 13 19:21:46 2009 (4A5BC18A)
fffff880`00e2e000 fffff880`00e3f000   Npfs     Npfs.SYS     Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`04068000 fffff880`04074000   nsiproxy nsiproxy.sys Mon Jul 13 19:21:02 2009 (4A5BC15E)
fffff800`02a55000 fffff800`03032000   nt       ntkrnlmp.exe Tue Oct 26 22:43:09 2010 (4CC791BD)
fffff880`01216000 fffff880`013b9000   Ntfs     Ntfs.sys     Mon Jul 13 19:20:47 2009 (4A5BC14F)
fffff880`018b9000 fffff880`018c2000   Null     Null.SYS     Mon Jul 13 19:19:37 2009 (4A5BC109)
fffff880`0459b000 fffff880`045ec380   nvmf6264 nvmf6264.sys Thu Apr 30 15:45:59 2009 (49F9FFF7)
fffff880`010e6000 fffff880`01111000   nvstor   nvstor.sys   Wed May 20 02:45:37 2009 (4A13A711)
fffff880`01173000 fffff880`011b2000   nvstor64 nvstor64.sys Tue Jun 30 20:21:51 2009 (4A4AAC1F)
fffff880`0388d000 fffff880`038e0000   nwifi    nwifi.sys    Mon Jul 13 20:07:23 2009 (4A5BCC3B)
fffff880`02d66000 fffff880`02d8c000   pacer    pacer.sys    Mon Jul 13 20:09:41 2009 (4A5BCCC5)
fffff880`041ca000 fffff880`041e7000   parport  parport.sys  Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`00fa8000 fffff880`00fbd000   partmgr  partmgr.sys  Mon Jul 13 19:19:58 2009 (4A5BC11E)
fffff880`00f68000 fffff880`00f9b000   pci      pci.sys      Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`00fd2000 fffff880`00fd9000   pciide   pciide.sys   Mon Jul 13 19:19:49 2009 (4A5BC115)
fffff880`00fd9000 fffff880`00fe9000   PCIIDEX  PCIIDEX.SYS  Mon Jul 13 19:19:48 2009 (4A5BC114)
fffff880`014f0000 fffff880`01501000   pcw      pcw.sys      Mon Jul 13 19:19:27 2009 (4A5BC0FF)
fffff880`05e7f000 fffff880`05f25000   peauth   peauth.sys   Mon Jul 13 21:01:19 2009 (4A5BD8DF)
fffff880`05a00000 fffff880`05a3d000   portcls  portcls.sys  Mon Jul 13 20:06:27 2009 (4A5BCC03)
fffff880`00c83000 fffff880`00c97000   PSHED    PSHED.dll    Mon Jul 13 21:32:23 2009 (4A5BE027)
fffff880`053a2000 fffff880`053c6000   rasl2tp  rasl2tp.sys  Mon Jul 13 20:10:11 2009 (4A5BCCE3)
fffff880`053d2000 fffff880`053ed000   raspppoe raspppoe.sys Mon Jul 13 20:10:17 2009 (4A5BCCE9)
fffff880`0513c000 fffff880`0515d000   raspptp  raspptp.sys  Mon Jul 13 20:10:18 2009 (4A5BCCEA)
fffff880`0515d000 fffff880`05177000   rassstp  rassstp.sys  Mon Jul 13 20:10:25 2009 (4A5BCCF1)
fffff880`04017000 fffff880`04068000   rdbss    rdbss.sys    Mon Jul 13 19:24:09 2009 (4A5BC219)
fffff880`053ed000 fffff880`053f8000   rdpbus   rdpbus.sys   Mon Jul 13 20:17:46 2009 (4A5BCEAA)
fffff880`0146e000 fffff880`01477000   RDPCDD   RDPCDD.sys   Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`08796000 fffff880`087c4000   rdpdr    rdpdr.sys    Mon Jul 13 20:18:02 2009 (4A5BCEBA)
fffff880`011e7000 fffff880`011f0000   rdpencdd rdpencdd.sys Mon Jul 13 20:16:34 2009 (4A5BCE62)
fffff880`011f0000 fffff880`011f9000   rdprefmp rdprefmp.sys Mon Jul 13 20:16:35 2009 (4A5BCE63)
fffff880`08600000 fffff880`08638000   RDPWD    RDPWD.SYS    Mon Jul 13 20:16:47 2009 (4A5BCE6F)
fffff880`01982000 fffff880`019bc000   rdyboost rdyboost.sys Mon Jul 13 19:34:34 2009 (4A5BC48A)
fffff880`038f3000 fffff880`0390b000   rspndr   rspndr.sys   Mon Jul 13 20:08:50 2009 (4A5BCC92)
fffff880`08790000 fffff880`08796000   RTCore64 RTCore64.sys Wed May 25 02:39:12 2005 (42941D90)
fffff880`05f25000 fffff880`05f30000   secdrv   secdrv.SYS   Wed Sep 13 09:18:38 2006 (4508052E)
fffff880`041e7000 fffff880`041f3000   serenum  serenum.sys  Mon Jul 13 20:00:33 2009 (4A5BCAA1)
fffff880`02db1000 fffff880`02dce000   serial   serial.sys   Mon Jul 13 20:00:40 2009 (4A5BCAA8)
fffff880`01978000 fffff880`01982000   speedfan speedfan.sys Sat Dec 18 06:03:51 2010 (4D0C9517)
fffff880`01970000 fffff880`01978000   spldr    spldr.sys    Mon May 11 12:56:27 2009 (4A0858BB)
fffff880`05f6f000 fffff880`05fe0000   spsys    spsys.sys    Mon May 11 13:20:58 2009 (4A085E7A)
fffff880`086fb000 fffff880`08790000   srv      srv.sys      Wed Feb 23 00:16:24 2011 (4D649828)
fffff880`08694000 fffff880`086fb000   srv2     srv2.sys     Wed Feb 23 00:15:59 2011 (4D64980F)
fffff880`05f30000 fffff880`05f5d000   srvnet   srvnet.sys   Wed Feb 23 00:15:49 2011 (4D649805)
fffff880`01111000 fffff880`01173000   storport storport.sys Mon Jul 13 20:01:18 2009 (4A5BCACE)
fffff880`0523e000 fffff880`0523f480   swenum   swenum.sys   Mon Jul 13 20:00:18 2009 (4A5BCA92)
fffff880`01601000 fffff880`017fe000   tcpip    tcpip.sys    Sun Jun 13 23:39:04 2010 (4C15A458)
fffff880`05f5d000 fffff880`05f6f000   tcpipreg tcpipreg.sys Mon Jul 13 20:09:49 2009 (4A5BCCCD)
fffff880`00c5c000 fffff880`00c69000   TDI      TDI.SYS      Mon Jul 13 19:21:18 2009 (4A5BC16E)
fffff880`087c4000 fffff880`087cf000   tdtcp    tdtcp.sys    Mon Jul 13 20:16:32 2009 (4A5BCE60)
fffff880`00ddf000 fffff880`00dfd000   tdx      tdx.sys      Mon Jul 13 19:21:15 2009 (4A5BC16B)
fffff880`02de9000 fffff880`02dfd000   termdd   termdd.sys   Mon Jul 13 20:16:36 2009 (4A5BCE64)
fffff960`004b0000 fffff960`004ba000   TSDDD    TSDDD.dll    unavailable (00000000)
fffff880`087cf000 fffff880`087de000   tssecsrv tssecsrv.sys Mon Jul 13 20:16:41 2009 (4A5BCE69)
fffff880`0418f000 fffff880`041b5000   tunnel   tunnel.sys   Mon Jul 13 20:09:37 2009 (4A5BCCC1)
fffff880`051dd000 fffff880`051ef000   umbus    umbus.sys    Mon Jul 13 20:06:56 2009 (4A5BCC20)
fffff880`0425c000 fffff880`04279000   usbccgp  usbccgp.sys  Mon Jul 13 20:06:45 2009 (4A5BCC15)
fffff880`05a43000 fffff880`05a44f00   USBD     USBD.SYS     Mon Jul 13 20:06:23 2009 (4A5BCBFF)
fffff880`04340000 fffff880`04351000   usbehci  usbehci.sys  Sat Oct 24 00:27:33 2009 (4AE28235)
fffff880`0439f000 fffff880`043f9000   usbhub   usbhub.sys   Sat Oct 24 00:28:24 2009 (4AE28268)
fffff880`041f3000 fffff880`041fe000   usbohci  usbohci.sys  Mon Jul 13 20:06:30 2009 (4A5BCC06)
fffff880`042ea000 fffff880`04340000   USBPORT  USBPORT.SYS  Mon Jul 13 20:06:31 2009 (4A5BCC07)
fffff880`00f9b000 fffff880`00fa8000   vdrvroot vdrvroot.sys Mon Jul 13 20:01:31 2009 (4A5BCADB)
fffff880`01460000 fffff880`0146e000   vga      vga.sys      Mon Jul 13 19:38:47 2009 (4A5BC587)
fffff880`05a54000 fffff880`05bfe000   viahduaa viahduaa.sys Wed Nov 25 08:06:00 2009 (4B0D2BB8)
fffff880`010be000 fffff880`010e3000   VIDEOPRT VIDEOPRT.SYS Mon Jul 13 19:38:51 2009 (4A5BC58B)
fffff880`01914000 fffff880`01924000   vmstorfl vmstorfl.sys Mon Jul 13 19:42:54 2009 (4A5BC67E)
fffff880`00fbd000 fffff880`00fd2000   volmgr   volmgr.sys   Mon Jul 13 19:19:57 2009 (4A5BC11D)
fffff880`00c00000 fffff880`00c5c000   volmgrx  volmgrx.sys  Mon Jul 13 19:20:33 2009 (4A5BC141)
fffff880`01924000 fffff880`01970000   volsnap  volsnap.sys  Mon Jul 13 19:20:08 2009 (4A5BC128)
fffff880`0456a000 fffff880`04577000   vwifibus vwifibus.sys Mon Jul 13 20:07:21 2009 (4A5BCC39)
fffff880`02d8c000 fffff880`02da2000   vwififlt vwififlt.sys Mon Jul 13 20:07:22 2009 (4A5BCC3A)
fffff880`02dce000 fffff880`02de9000   wanarp   wanarp.sys   Mon Jul 13 20:10:21 2009 (4A5BCCED)
fffff880`01200000 fffff880`01210000   watchdog watchdog.sys Mon Jul 13 19:37:35 2009 (4A5BC53F)
fffff880`00e4b000 fffff880`00eef000   Wdf01000 Wdf01000.sys Mon Jul 13 19:22:07 2009 (4A5BC19F)
fffff880`00eef000 fffff880`00efe000   WDFLDR   WDFLDR.SYS   Mon Jul 13 19:19:54 2009 (4A5BC11A)
fffff880`02d5d000 fffff880`02d66000   wfplwf   wfplwf.sys   Mon Jul 13 20:09:26 2009 (4A5BCCB6)
fffff960`000a0000 fffff960`003b2000   win32k   win32k.sys   Wed Mar 02 22:58:01 2011 (4D6F11C9)
fffff880`00f55000 fffff880`00f5e000   WMILIB   WMILIB.SYS   Mon Jul 13 19:19:51 2009 (4A5BC117)
fffff880`01896000 fffff880`018b7000   WudfPf   WudfPf.sys   Mon Jul 13 20:05:37 2009 (4A5BCBD1)
fffff880`08638000 fffff880`0864a100   xusb21   xusb21.sys   Thu Aug 13 18:10:17 2009 (4A848F49)

Unloaded modules:
fffff880`01896000 fffff880`018a4000   crashdmp.sys
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000E000
fffff880`018a4000 fffff880`018b0000   dump_ataport
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  0000C000
fffff880`018b0000 fffff880`018b9000   dump_atapi.s
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00009000
fffff880`019d7000 fffff880`019ea000   dump_dumpfve
    Timestamp: unavailable (00000000)
    Checksum:  00000000
    ImageSize:  00013000
 
Ok cpuz images attached along with rammon txt file

msi afterburner uninstalled ( although i use for the graphics card temp monitor in game)

Avg uninstalled (now im not protected )

Just updated all my drivers ( the ones that was out of date) except i couldnt find a driver for the via hd audio driver ( i dont actually know what that driver as i dont have anything from Via)


View attachment RAMMon - SPD Info.txt
Untitled2.jpg
Untitled.jpg

thanks for reply.

Adam.
 
Ok cpuz images attached along with rammon txt file

Yes, wrong clocks indeed:

1) Memory, currently running at 1066Mhz, rated 1333 Mhz 9-9-9-24 1.5V - set it this way.

2) CPU, enable AMD Cool and Quiet.

~~~~~~~~~~~~~

msi afterburner uninstalled

Good. No overclocking for now.





Avg uninstalled (now im not protected )

I gave you the link to MSE, right?






except i couldnt find a driver for the via hd audio driver ( i dont actually know what that driver as i dont have anything from Via)

----> C:\Windows\system32\drivers\viahduaa.sys Wed Nov 25 08:06:00 2009

Then what is this driver doing in your system?

VIA Drivers Download - VIA Technologies, Inc.
 
Not sure what the via hd driver is doing there o0 and wow didnt know my ram timers was off sorry to sound like this but i have no clue how to change the timers can you point me in the right direction to set it right.

Thanks for reply.

Will download mse now

Do i really need cool n quiet my cpu only hits 42 c max load and its quiet enough.

Thanks.

Adam.
 
1. Set the memory to its rates. How? In the bios, usually ADVANCED DRAM CONFIGURATION in the bios setup program.
Setup defaults can do this job for you.


2. Cool and Quiet is recommended ESPECIALLY if you're sufferring from BSOD's.
 
1. Set the memory to its rates. How? In the bios, usually ADVANCED DRAM CONFIGURATION in the bios setup program.
Setup defaults can do this job for you.


2. Cool and Quiet is recommended ESPECIALLY if you're sufferring from BSOD's.


ok umm i went to bios saw under memory that everything was set to auto so i didnt change anything but i pressed f9 to load defualt bios settings didnt see anything change though. i also enabled the cool n quiet


Thanks


Adam.

what should i do from here.
 
Untitled.jpg

there both on that pic look in pain and on the desktop 1 is cpu 1 is memory

Edit sorry didnt notice paint was blank -_-


thanks.



Adam.
 
Last edited:
Link Removed due to 404 Error

there both on that pic look in pain and on the desktop 1 is cpu 1 is memory

Edit sorry didnt notice paint was blank -_-


thanks.
 
MEMORY_MANAGEMENT (1a)
BugCheck 1000007E, {ffffffffc0000005,


Ok, Adam, leave it on Auto then. Thanks for updating.
 
Hi i changed it from 9-12-12-30 to 9-12 12 24 duno if it will make a difference but do you think my ram could be corrupt should i buy different ram ?

thanks for help.


Adam.
 
Alright ill do a memtest over night and will update thread tommorow ill try setting the timers to 9-9-9-24 again hopefully it will sort its self out if it doesnt i think ill buy new ram.

Thanks


Adam.
 
Back
Top